injungbo

SecuIN Enterprise

A solution for security check and on-site audit

  • Instant data collection
  • File system analysis and environment collection
  • Permanent deletion of security violation documents
  • Security setting status analysis
  • Creation of security status board and report
인정보 제품

Main Functions

  • Main Functions of SecuIN Enterprise

    Check the PC security setting and identify vulnerabilities against external threats such as hacking
    Main Functions
    Function Description
    Password policy Check stability of system password such as minimum password length and usage period
    Firewall setting Check whether system firewall is set or not
    Screen saver check Check whether screen save is set and whether password is authenticated when returning
    Multiple OS check Check whether an OS other than the basic OS of the company is installed
    Vaccine status check Check whether vaccine is installed and whether it is running
    Windows update check Check whether the latest Windows update is installed
    Shared folder history Check the details of shared folder set in the system
    Network drive history Check the details of shared driver connected to the system
    Wireless network connection history Wireless network connection history Check details of wireless AP connected in the system
    Installed program list check Check the list of programs installed in the system and whether unauthorized programs are installed
    Process list check Check details of running process and whether unauthorized processes are running
    Recoverable file list check Check list of files erased files that remain recoverable on the drive
    Management of USB storage media Automatically collect information on USB storage media connected to PC
    Batch deletion of connectionhistory
    Manage files moved to storage media
    Block unauthorized use of USB storage media
    Risk management in PC document storage Check document storage status
    Check whether documents containing confidential/personal informationare stored
    Batch deletion if necessary
    Effective investigation Clear time series analysis of collected information
    Analysis function for detailed investigation at self-investigation
    Efficientmanagement Periodic reporting of analysis results
    Trend check through management console
    Quantify complementary status
    Immediate response to situation
    Running process Analysis by runningprocess
    Analysis of business by process
    Analysis of process use history
    Internet use Identify connection status
    Analyze business or non-business nature by access site
    Analyze cache, history, bookmarks and access history, etc.
    Time-series analysis by date
    Digital data analysis on PC without network tap
    Printing spool Manage printouts
    Analyze digital data for operating system Spool
    Mail Analysis of mail clients
    Immediate investigation into problem situation
    Clear time-series analysis of the collected information
    Analysis function that enables detailed investigation at self-investigation
  • Identification of Document Possession Status Containing Designated Pattern and Keywords

    Check storage status of files that users do not know so that file containing important contents and personal informationare not neglected

    Identification of Document Possession Status Containing Designated Pattern and Keywords

  • Internet Usage

    Check internet history on PC, display records of using prohibited internet sites and violations, time of visiting, URL information decoding

    Internet Usage

  • Quantification of Security Status and Individual Analysis

    Quantify 5 parts of personal security status

    Quantify 5 parts of personal security status

    1. 01) Simple security violation status: PC security status check
    2. 02) Document storage status: status of storage and retention after work on documents, drawing and files, files stored after the designated date.
    3. 03) Important data protection status: creation and encryption status of data that can be regarded as confidential
    4. 04) External connection status :history of access to the prohibited web page during internet use
    5. 05) External data transmission status: history of transmission of important data through mail-client
  • Document security status check– tracking of important data travel path

    Track travel path and delivery time of the important security document among personnel

    Document security status check– tracking of important data travel path

    1. 01) Automatically display the same file distribution status for the document file newly created
    2. 02) Display the same file distribution status of the file searched by filename
    3. 03) Search through file hash value
  • Comprehensive status check of work PC including recent work document, E-Mail receiving/sending information, usage history of USB external storage media, installation program list, website access history,
    Windows update, and PC security status.

    Comprehensive health check of work PCs

  • Comprehensive Status and Report

    Comprehensively check violation status and various other status.

    Comprehensive Status and Report